Combo with Firewalls and 5 others – Flashcards

Unlock all answers in this set

Unlock answers
question
Which of the following are performed by proxies?
answer
Block employees from accessing certain Web sites. Cache web pages.
question
What port does Telnet use?
answer
23
question
You want to install a firewall that can reject packets that are not part of an active session. Which type of firewall should you use?
answer
Circuit-level.
question
You have been given a laptop to use for work. You connect the laptop to your company network, use it from home and use it while traveling. You want to protect the laptop from Internet-based attacks. Which solution should you use?
answer
Host based firewall.
question
You have used firewalls to create a demilitarized zone. You have a Web server that needs to be accessible to Internet users. The Web server must communicate with a database server for retrieving product, customer, and order information. How should you place devices on the network to best protect the servers?
answer
Put the database server on the private network. Put the Web server on the DMZ.
question
Which of the following are characteristics of a circuit-level gateway?
answer
Filters based on sessions. Stateful.
question
You administer a Web server on your network. The computer has multiple IP addresses. They are 192.198.23.8 and 192.168.23.17. The name of the computer is www.westsim.com. You configured the Web site as follows: -IP address: 192.168.23.8 -HTTP Port: 1030 -SSL Port: 443 Users complain that they can't connect to the Web site when they type www.westsim.com. What is the most likely source of the problem?
answer
The HTTP port should be changed to 80.
question
Your company leases a very fast Internet connection and pays for it based on usage. You have been asked by the company to reduce Internet line lease costs. You want to reduce the amount of web pages that are downloaded over the leased connection, without decreasing performance. What is the best way to do this?
answer
Install a proxy server.
question
You have a router that is configured as a firewall. The router is a layer 3 device only. Which of the following does the router use for identifying allowed or denied packets?
answer
IP address.
question
You are configuring a firewall to allow access to a server hosted on the demilitarized zone on your network. You open TCP/IP ports 80, 25, 110, and 143. Assuming that no other ports on the firewall need to be configured to provide access, what applications are most likely to be hosted on the server?
answer
Web server, e-mail server.
question
To increase security on your computer's internal network, the administrator has disabled as many ports as possible. Now, however, though you can browse the Internet, you are unable to perform secure credit card transactions. Which port needs to be enabled to allow secure transactions?
answer
443.
question
You provide Internet access for a local school. You want to control Internet access based on user, and prevent access to specific URLs. Which type of firewall should you install?
answer
Application level.
question
Which of the following does a router acting as a firewall use to control which packets are forwarded or dropped?
answer
ACL.
question
You have a company network that is connected to the Internet. You want all users to have Internet access, but need to protect your private network and users. You also need to make a Web server publicly available to Internet users. Which solution should you use?
answer
Use firewalls to create a DMZ. Place the Web server inside the DMZ, and the private network behind the DMZ.
question
Which protocol and port is used by BOOTP/DHCP?
answer
UDP 67
question
After blocking a number of ports to secure your server, you are unable to send e-mail. To allow e-mail service which of the following needs to be done?
answer
Open port 25 and allow STMP service.
question
Which of the following network services or protocols uses TCP/IP port 69?
answer
TFTP.
question
How does a proxy server differ from a packet filtering firewall?
answer
A proxy server operates at the Application layer, while a packet filtering firewall operates at the Network layer.
question
Which protocol and port number is used by TFTP?
answer
UDP 69.
question
Your company has a connection to the Internet that allows users to access the Internet. You also have a Web server and an e-mail server that you want to make available to Internet users. You want to create a DMZ for these two servers. Which type of device should you use to create the DMZ?
answer
Network based firewall.
question
Which of the following connectivity hardware is used to create a VLAN?
answer
Switch.
question
You run a small network for your business that has a single router connected to the Internet and a single switch. You keep sensitive documents on a computer that you would like to keep isolated from other computers on the network. Other hosts on the network should not be able to communicate with this computer through the switch, but you still need to access the network through the computer. What should you use for this situation?
answer
VLAN
question
You manage a network that uses switches. In the lobby of your building are three RJ-45 ports connected to a switch. You want to make sure that visitors cannot plug their computers to the free network and connect to the network. However, employees who plug into those same jacks should be able to connect to the network. What feature should you configure?
answer
Port authentication.
question
You manage a network that uses a single switch. All ports within your building connect through the single switch. In the lobby of your building are three RJ-45 ports connected to a switch. You want to allow visitors to plug into these ports to gain Internet access, but they should not have access to any other devices on your private network. Employees connected throughout the rest of your building should have both private and Internet access. Which feature should you implement?
answer
VLANs.
question
Which type of device is required to implement port authentication throughout a switch?
answer
RADIUS server.
question
Which of the following best describes the concept of virtual LAN?
answer
Devices on the same network logically grouped as if they were on separate networks.
question
You manage a single subnet with three switches. The switches are connected to provide redundant paths between the switches. Which feature allows the switches to pass VLAN traffic between the switches?
answer
Trunking.
question
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the second switch also in VLAN 1. What should you configure to allow communication between these two devices through the switches?
answer
Trunking.
question
Your company is a small start-up company that has leased office space in a building shared by other businesses. All businesses share a common network infrastructure. A single switch connects all devices in the building to the router that provides Internet access. You would like to make sure that your computers are isolated from computers used by other companies. Which feature should you request to have implemented?
answer
VLAN.
question
You manage a network with two switches. The switches are connected together through their Gigabit Ethernet uplink ports. You define VLAN 1 and VLAN 2 on each switch. A device on the first switch in VLAN 1 needs to communicate with a device on the same switch which is in VLAN 2. What should you configure so that the two devices can communicate?q
answer
Routing.
question
When configuring VLANs on a switch, what is used to identify VLAN membership of a device?
answer
Switch port.
question
Which switch features are typically used with VoIP
answer
VLAN. PoE.
question
When configuring VLANs on a switch, what type of switch ports are members of all VLANs defined on the switch?
answer
Trunk ports.
question
Which of the following do switches and wireless access points use to control access through the device?
answer
MAC filtering.
question
Which of the following protocols can your portable computer use to connect to your company's network via a virtual tunnel through the Internet?
answer
PPTP. L2TP.
question
IPSec is implemented through two separate protocols. What are these protocols called?
answer
AH. ESP.
question
A VPN is sued primarily for what purpose?
answer
Support secured communications over a trusted network.
question
You want to allow traveling users to connect to your private network through the Internet. Users will connect from various locations including airports,hotels, and public access points such as coffee shops and libraries. As such, you won't be able to configure the firewalls that might be controlling access to the Internet in these locations. Which of the following protocols would be most likely to be allowed through the widest number of firewalls?
answer
SSL
question
Which of the following network layer protocol provides authentication and encryption services for IP based network traffic?
answer
IPSec
question
You are in the middle of a big project at work. All of your work files are on a server at the office. You want to be able to access the server desktop, open and edit files, save the files on the server, and print to a printer connected to a computer at home. Which protocol should you use?
answer
RDP
question
You have a group of salesmen who would like to access your private network through the Internet while they are traveling. You want to control access to the private network through a single server. Which solution should you implement?
answer
VPN concentrator.
question
You want to use a protocol that can encapsulate other LAN protocols and carry the data securely over an IP network. Which of the following protocols is suitable for this task?
answer
PPTP.
question
Which of the following authentication protocols uses a three-way handshake to authenticate users to the network?
answer
CHAP. MS-CHAP.
question
When using Kerberos authentication, which of the following terms is used to describe the token that verifies the identity of the user to the target system?
answer
Ticket.
question
Which of the following authentication methods uses tickets to provide single sign-on?
answer
Kerberos.
question
You want to increase the security of your network by allowing authenticated users to be able to access network devices through a switch. Which of the following should you implement?
answer
802.1x
question
Which of the following is a feature of MS CHAP v2 that is not included in CHAP?
answer
Mutual authentication.
question
Which of the following is a mechanism for granting and validating certificates?
answer
PKI
question
Which of the following are used when implementing Kerberos for authentication and authorization?
answer
Ticket granting server. Time server.
question
You want to implement an authentication method that uses public and private key pairs. Which authentication method should you use?
answer
EAP.
question
You have been contracted by a firm to implement a new remote access solution based on a Windows Server 2003 system. The customer wants to purchase and install a smartcard system to provide a high level of security to the implementation. Which of the following authentication protocols are you most likely to recommend to the client?
answer
EAP.
question
Which of the following applications typically uses 802.1x authentication?
answer
Controlling access through a wireless access point. Controlling access through a switch.
question
You have a Web server that will be used for secure transactions for customers who access the Web site over the Internet. The Web server requires a certificate to support SSL. Which method would you use to get a certificate for the server?
answer
Obtain a certificate from a public PKI.
question
Which of the following are improvements to SNMP that are included within SNMP version 3?
answer
Authentication for agents and managers. Encryption of SNMP messages.
question
Which protocol does HTTPS use to offer greater security for Web transactions?
answer
SSL.
question
Talnet is inherently insecure because its communication is in plain text and is easily interpreted. Which of the following is an acceptable alternative to Talnet?
answer
SSH.
question
Which of the protocols is used for securely browsing a Web site?
answer
HTTPS
question
You have been using SNMP on your network for monitoring and management. You are concerned about the security of this configuration. What should you do?
answer
Implement version 3 of SNMP.
question
Which of the following protocols can be used to securely manage a network device from a remote connection?
answer
SSH.
question
Which of the following protocols are often added to other protocols to provide secure transmission of data?
answer
TLS. SSL.
question
You want to make sure that a set of servers will only accept traffic for specific network services. You have verified that the servers are only running the necessary services, but you also want to make sure that the servers will not accept packets sent to those services. Which tool should you use?
answer
Port scanner.
question
Which of the following devices is capable of detecting and responding to security threats?
answer
IPS.
question
Which of the following functions can a port scanner provide?
answer
Determine which ports are open on a firewall. Discover unadvertised servers.
question
Which of the following devices can monitor a network and detect potential security attacks?
answer
IDS.
question
You are concerned about protecting your network from network-based attacks from the Internet. Specifically, you are concerned about "zero day" attacks (attacks that have not yet been identified or that do not have prescribed protections). Which type of device should you use?
answer
Anomaly based IDS>
question
Which IDS method searches for intrusion or attack attempts by recognizing patterns or identities listed in a database?
answer
Signature based.
question
You are concerned about attacks directed at your network firewall. You want to be able to identify and be notified of any attacks. In addition, you want the system to take immediate action when possible to stop or prevent the attack Which tool should you use?
answer
IPS.
question
As a security precaution, you have implemented IPsec that is used between any two devices on your network. IPsec provides encryption for traffic between devices. You would like to implement a solution that can scan the contents of the encrypted traffic to prevent any malicious attacks. Which solution should you implement?
answer
Host based IDS.
question
What is the most common form of based IDS that employs signature or pattern matching detection methods?
answer
Anti-virus software.
question
Which of the following is a security service that monitors network traffic in real time or reviews the audit logs on servers looking for security violations?
answer
IDS.
question
What security mechanism can be used to detect attacks originating on the Internet or from within an internal trusted subnet?
answer
IDS.
question
What actions can a typical passive Intrusion Detection System (IDS) take when it detects an attack?
answer
An alert is generated and delivered via Email, the console, or an SNMP trap. The IDS logs all pertinent data about the intrusion.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New